IAS - Lesson 1

IAS - Lesson 1

University

15 Qs

quiz-placeholder

Similar activities

CLOUD COMPUTING: ACTIVITY 3

CLOUD COMPUTING: ACTIVITY 3

University

10 Qs

CompTIA Core 2  20221023

CompTIA Core 2 20221023

University

10 Qs

Quiz Rolling Vol.8

Quiz Rolling Vol.8

10th Grade - University

10 Qs

POP QUIZ 4 (DFC40243)

POP QUIZ 4 (DFC40243)

University

10 Qs

21CSC305P - Machnine Learning - Quiz

21CSC305P - Machnine Learning - Quiz

University

15 Qs

MIDTERM EXAM - IT APP

MIDTERM EXAM - IT APP

University

17 Qs

Cryptography

Cryptography

6th Grade - University

15 Qs

CHAPTER 1: COMPUTER SECURITY REVIEW

CHAPTER 1: COMPUTER SECURITY REVIEW

University

10 Qs

IAS - Lesson 1

IAS - Lesson 1

Assessment

Quiz

Computers

University

Medium

Created by

Coo K

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The security goal of ensuring that you can access information systems and their data when you need them. They must be available in a dependable and timely manner. This is called?

Availability

Confidentiality

Integrity

Authencity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The security goal of ensuring that only authorized persons can access information systems and their data. This is called?

Availability

Confidentiality

Integrity

Authencity

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A successful attack against a vulnerability is called?

external attacker

exploit

patch

risk

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker that has no current relationship with the organization they're attacking is called?

external attacker

internal attacker

physical safeguard

management

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The study and practice of protecting information. The main goal of information security is to protect its confidentiality, integrity, and availability is called?

information security

computer security

physical safeguard

administrative safeguard

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The security goal of ensuring that no changes are made to information systems and their data without permissions is called?

Availability

Confidentiality

Integrity

Authenticity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker that has a current relationship with the organization he or she is attacking. It can be an angry employee. This is called?

external attacker

internal attacker

physical safeguard

subject of an attack

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?